Universal Access To All Knowledge
Home Donate | Store | Blog | FAQ | Jobs | Volunteer Positions | Contact | Bios | Forums | Projects | Terms, Privacy, & Copyright
Search: Advanced Search
Anonymous User (login or join us)
Upload
Search Results
Results: 1 through 50 of 59 (0.02 secs)
You searched for: subject:"Vulnerabilities"
[1] 2     Next    Last
[audio]Ownedcast Episode 1 - Blackbird Labs
Ownedcast Episode 1: June 18, 2006
Keywords: security; vulnerabilities; geek; ownedcast; tech
Downloads: 1,159
[audio]Ownedcast Episode 1 - Blackbird Labs
Ownedcast Episode 1: June 18, 2006
Keywords: Security; Ownedcast; Vulnerabilities; Tech; Geek
Downloads: 92
[audio]Ownedcast Episode 4 - Blackbird Labs
Ownedcast Episode 4 for July 8, 2006.
Keywords: Security; Vulnerabilities; Tech; Geek; Ownedcast
Downloads: 78
[audio]Ownedcast Episode 2 - Blackbird Labs
Ownedcast Episode 2 for June 28, 2006.
Keywords: Vulnerabilities; Geek; Tech; Security; Ownedcast
Downloads: 108
[movies]HITB 2003 Security Conference - Simos Xenitellis - Event-driven system security vulnerabilities, an overview and demonstration
Simos Xenitellis - Event-driven system security vulnerabilities, an overview and demonstration The event-driven model is used to implement software systems like graphical user interfaces (GUIs). An example of such a GUI is Microsoft Windows which we examine in detail. In an event-driven system, applications communicate with each other and with the system through events. While in Windows NT/2000/XP/2003 there is memory protection between applications belonging to different users, there is no prot...
Keywords: hack; security; vulnerabilities; security conference; security professional
Downloads: 282
[movies]HITB 2003 Security Conference - Panel Discussion
HITBSecConf2003 Panel Discussion A panel discussion comprising (left to right): * HD Moore * Shreeraj Shah * Adam Gowdiak (LSD) * Job De Haas * Kol. Hussin (NISER/MyCERT) * Nitesh Dhanjani * Dr. Dinesh Nair * Shamsul Jafni (MCMC)
Keywords: hack; security; vulnerabilities; security conference; security professional
Downloads: 161
[movies]HITB 2003 Security Conference - Dinesh Nair - From Script Kiddies to Security Consultants
Dinesh Nair - From Script Kiddies to Security Consultants Frequently, the press has misrepresented hackers, crackers and script kiddies. There is a lot of myth and aura about practitioners of computer and network security. This presentation traces the journey of one such individual as he progresses from playing with the public switched telephone system to the TCP/IP networks of today, and the mobile and 3G networks of tomorrow.
Keywords: security; hack; vulnerabilities; security conference; security professional
Downloads: 885
[movies]Ep20 - Website Enumeration With Nikto - Tech Chop
http://www.techchop.com - In this episode, Paul shows us how to do some pre-hack reconnaissance (Enumeration) of web servers using a Linux command line utility called Nikto on Bauer-Puntu Linux 12.04. Nikto: http://cirt.net/nikto2 Bauer-Puntu: http://puntu.bauer-power.net
Keywords: how to; enumerate; website; vulnerabilities; nikto
Downloads: 231
[movies]HITB 2004 Security Conference - Emmanuel Gadaix - Phreaking in the 21st Century
Emmanuel Gadaix (TSTF) Phreaking in the 21st Century Historical and new telephony vulnerabilities (presentation material in zip)
Keywords: telephone; phone; phreaking; security; conference; vulnerabilities; telephony
Downloads: 405
[movies]HITB 2004 Security Conference - Jose Nazario - Packet Mastering
Jose Nazario Packet Mastering some tools/libraries/techniques (presentation material in zip)
Keywords: hack; security; conference; vulnerabilities; packet; tcp; udp; ip; security professional
Downloads: 238
[movies]HITB 2004 Security Conference - Adam Gowdiak - Java 2 Micro Edition (J2ME) Security Vulnerabilities
Adam Gowdiak Java 2 Micro Edition (J2ME) Security Vulnerabilities Reverse engineering exploits on his own mobile phone (presentation materials in zip file)
Keywords: hack; security; conference; Java; J2ME; vulnerabilities; mobile; phone
Downloads: 490
[movies]HITB 2004 Security Conference - Suresh Ramasamy (TimeDotCom) - Cryptography Demystified
Suresh Ramasamy (TimeDotCom) Cryptography Demystified
Keywords: hack; security; vulnerabilities; cryptography; security conference; security professional
Downloads: 426
[movies]HITB 2003 Security Conference - Job De Haas - Hacking software and hardware in a PDA/GSM Device
Job De Haas - Hacking software and hardware in a PDA/GSM Device The computer world is getting mobile and connected at faster and faster rates. The latest developments are the integration of mobile phones and PDA's connected with WiFi and GPRS. This presentation shows some means of hacking such a device both at the software and hardware level. As an example the XDA (also known as T-mobile PDA, Qtek or Siemens SX 45 ) is used...
Keywords: security; hack; vulnerabilities; wireless; GSM; PDA; security conference; security professional
Downloads: 2,246
[movies]HITB 2003 Security Conference - Nitesh Dhanjani - Hacking with Linux Kernel Modules
Nitesh Dhanjani - Hacking with Linux Kernel Modules LKMs allow users to write code in the kernel space. Therefore, it becomes extremely easy to use LKMs to perform System Call Interception in order to perform tricks such as: Hide files and processes, trojanize executables, write shell backdoors, and much more. These are the tricks used by authors of most malicious backdoors. Hopefully, this knowledge will allow individuals that have been infected by such backdoors to understand how they work, an...
Keywords: linux; kernel; hack; security; vulnerabilities; security conference; security professional
Downloads: 1,561
[movies]HITB 2004 Security Conference - Gareth Davies - Advanced Information Gathering aka Google Hacking
Gareth Davies (NSS MSC) Advanced Information Gathering aka Google Hacking Discussion of some tools and techniques. Learn about what makes a google dork and how not to be one. (presentation material in zip)
Keywords: google; search engine; security; hack; vulnerabilities; penetration testing; security professional
Downloads: 4,653 3.00 out of 5 stars3.00 out of 5 stars3.00 out of 5 stars(1 review)
[movies]HITB 2004 Security Conference - Jorge Sebastiao - Wireless Network Security
Jorge Sebastiao (ES-Gulf) Wireless Network Security
Keywords: security; conference; hack; vulnerabilities; wireless; network; security professional
Downloads: 277
[movies]HITB 2004 Security Conference -Sukdev Singh (ISS) - Protecting Your Business From Phishing and Internet Attacks
Sukdev Singh (ISS) Protecting Your Business From Phishing and Internet Attacks (persentation material in zip)
Keywords: hack; security; vulnerabilities; phishing; security conference; security professional
Downloads: 253
[movies]HITB 2004 Security Conference - Toh Swee Hoe (MCMC) - Information Network Security Issues in the Communications and Multimedia Industry
Toh Swee Hoe (MCMC) Information Network Security Issues in the Communications and Multimedia Industry (presentation material in zip)
Keywords: hack; security; vulnerabilities; network; multimedia; security conference; security professional
Downloads: 1,015
[movies]HITB 2003 Security Conference - Keynote - Last Stage of Delirium (LSD) - Microsoft Windows RPC security vulnerabilities
Keynote: Last Stage of Delirium (LSD) - Microsoft Windows RPC security vulnerabilities The presentation discusses security vulnerabilities of Microsoft Windows operating systems in the context of RPC communication component. It begins with a brief introduction to Microsoft RPC with special emphasis on its security will be provided. Further on, the talk covers reverse engineering techniques that have been successfully applied during the process of a security audit of Windows RPC services along wi...
Keywords: security; windows; hack; vulnerabilities; security conference; security professional
Downloads: 315
[movies]HITB 2004 Security Conference - SK Chong (Scan Associates) - Windows Local Kernel Exploitation
SK Chong (Scan Associates) Windows Local Kernel Exploitation (presentation material in zip)
Keywords: hack; security; vulnerabilities; windows; kernel; security conference; security professional
Downloads: 437
[movies]HITB 2003 Security Conference - HD Moore - Advanced Exploit Development (Trends and Tools)
HD Moore - Advanced Exploit Development (Trends and Tools) This presentation focuses on the tools, techniques, and frameworks that can be used to write truly advanced exploit code. Some basic exploit information will be covered, as well as the current state of development, recent trends, and an exclusive look at a number of previously unreleased tools. Attendees will be provided with early access to version 2.0 of the Metasploit Exploit Framework; this package implements many of the techniques p...
Keywords: hack; security; vulnerabilities; exploits; security conference; security professional
Downloads: 1,093
[movies]HITB 2003 Security Conference - Shreeraj Shah - Defending Web Applications: Strategies, methods and practices
Shreeraj Shah - Defending Web Applications: Strategies, methods and practices Web applications can not be defended by firewall or any other security products. Web application defense strategies require secure coding at application level, knowing your application and protecting them by human intelligence. Knowing your application can lead to profiling your web assets in logical way. Profiling web assets provides better picture of various possible attacks set...
Keywords: hack; web; security; vulnerabilities; security conference; security professional
Downloads: 371
[movies]HITB 2003 Security Conference - Yerra Ravi Kiran Raju - New Generation Frauds
Yerra Ravi Kiran Raju - New Generation Frauds Security is not the issue of devices, its the issue of people. Many credit card companies/banks are changing their panorama of e-transactions such as upgrading Traditional Magnetic Strip to Smart chip based authentication or dual authentication, unfortunately every change has a counter effect like New Generation Cloning (Smart Card Cloning). This presentation will discuss the new generation frauds such as credit card cloning, smartcard cloning, credi...
Keywords: fraud; hack; security; vulnerabilities; security conference; security professional
Downloads: 4,565
[movies]HITB 2003 Security Conference - Meling Mudin - Putting the Eye on IDS
Meling Mudin - Putting the Eye on IDS Nowadays, a lot of organizations are deploying Intrusion Detection Systems (IDSes) as part of their security infrastructure. In Malaysia, we have seen IDS deployments in the public sector, and also private sector. However, there are a few questions that are always asked by these organizations when deploying IDSes: What is in it for my organization? Unlike other security devices such as firewalls and VPNs, organizations do not see the immediate value of .avi....
Keywords: IDS; intrusion; vulnerabilities; security; hack; security conference; security professional
Downloads: 802
[movies]HITB 2004 Security Conference - Keynote Speaker 1 - Theo de Raadt - Exploit Mitigation Techniques
Keynote Speaker 1 Theo de Raadt Exploit Mitigation Techniques (presentation material in zip)
Keywords: hack; security; unix; linux; open bsd; exploit; vulnerabilities; security professional
Downloads: 423
[movies]HITB 2003 Security Conference - Red Dragon (The Hackers Choice) - Advanced Linux Kernel Logger
Red Dragon (The Hackers Choice) - Advanced Linux Kernel Logger This presentation discusses some of the more advanced techniques in writing kernel based keyloggers and presents the release of THC-vlogger 2.1 with new keystroke logging techniques and more features such as centralized logging. THC-vlogger, first presented in Phrack Magazine #59, enables the capability to log keystrokes of all administrator/user's sessions via console, serial port and Telnet/SSH remote sessions, switching logging mo...
Keywords: Linux; kernel; security; vulnerabilities; hack; security conference; security professional
Downloads: 5,977
[movies]HITB 2004 Security Conference - Teo Sze Siong - Stealth Virus Design Thru Breeding Concept (Non Polymorphic)
Teo Sze Siong Stealth Virus Design Thru Breeding Concept (Non Polymorphic) (presentation material in zip)
Keywords: hack; worm; security; vulnerabilities; windows; virus; stealth; security conference; security professional
Downloads: 234
[movies]HITB 2003 Security Conference - Md. Saleh Raub and Shahril bin. Abdul Malek - Silence of the LAMP
Md. Saleh Raub and Shahril bin. Abdul Malek - Silence of the LAMP LAMP - Linux, Apache; MySQL, PHP is used for web services This discuses some vulnerabilities known at the time
Keywords: Linux; Apache; MySQL; PHP; security; vulnerabilities; hack; security conference; security professional
Downloads: 2,347
[movies]HITB 2003 Security Conference - Shaheezul (Pandir Harris) - IDS over IPV6
Shaheezul (Pandir Harris) - IDS over IPV6 IDS - intrusion detetction system IPV6 - newer IP protocol (versus IPV4) part of research with a local university (presentation material in zip)
Keywords: IDS; intrusion; IPV6; security; hack; vulnerabilities; security conference; security professional
Downloads: 333
[audio]Preparing for DDoS and Botnet Attacks | BreakingPoint Webcast - BreakingPoint Systems
Distributed denial of service (DDoS) and botnet attacks are an imminent threat to your network and the only way to test network equipment and application servers is by hitting them with actual DDoS and botnet attacks. BreakingPoint security experts got together to examine the best ways of replicating DDoS and botnet attacks to find vulnerabilities before someone else does. Listen to the discussion featuring BreakingPoint Chief Technology Officer, Dennis Cox and BreakingPoint Labs security resear...
Keywords: DDoS; botnet; security; vulnerabilities; network security; load testing; performance testing; security testing; breakingpoint; dennis cox; tod beardsley; dustin trammell
Downloads: 200
[movies]Day 1 Part 3: Exploits 2: Exploitation in the Windows Environment - Corey K.
The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news @OpenSecTraining. This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows...
Keywords: OpenSecurityTraining.info; Exploits; Vulnerabilities; software vulnerabilities; buffer overflows; smashing the stack; SEH; structured exception handling; SEHOP; SafeSEH; DEP; Data Execution Prevention; bypassing DEP; ASLR; Address Space Layout Randomization; bypassing ASLR; fuzzing; fuzzer; reverse engineering; Computers; Computer Security; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 942
[movies]Day 2 Part 1: Exploits 2: Exploitation in the Windows Environment - Corey K.
The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news @OpenSecTraining. This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows...
Keywords: OpenSecurityTraining.info; Exploits; Vulnerabilities; software vulnerabilities; buffer overflows; smashing the stack; SEH; structured exception handling; SEHOP; SafeSEH; DEP; Data Execution Prevention; bypassing DEP; ASLR; Address Space Layout Randomization; bypassing ASLR; fuzzing; fuzzer; reverse engineering; Computers; Computer Security; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 856
[movies]Day 2 Part 2: Exploits 2: Exploitation in the Windows Environment - Corey K.
The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news @OpenSecTraining. This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows...
Keywords: OpenSecurityTraining.info; Exploits; Vulnerabilities; software vulnerabilities; buffer overflows; smashing the stack; SEH; structured exception handling; SEHOP; SafeSEH; DEP; Data Execution Prevention; bypassing DEP; ASLR; Address Space Layout Randomization; bypassing ASLR; fuzzing; fuzzer; reverse engineering; Computers; Computer Security; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 771
[movies]Day 3 Part 1: Exploits 2: Exploitation in the Windows Environment - Corey K.
The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news @OpenSecTraining. This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows...
Keywords: OpenSecurityTraining.info; Exploits; Vulnerabilities; software vulnerabilities; buffer overflows; smashing the stack; SEH; structured exception handling; SEHOP; SafeSEH; DEP; Data Execution Prevention; bypassing DEP; ASLR; Address Space Layout Randomization; bypassing ASLR; fuzzing; fuzzer; reverse engineering; Computers; Computer Security; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 673
[movies]Day 3 Part 2: Exploits 2: Exploitation in the Windows Environment - Corey K.
The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news @OpenSecTraining. This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows...
Keywords: OpenSecurityTraining.info; Exploits; Vulnerabilities; software vulnerabilities; buffer overflows; smashing the stack; SEH; structured exception handling; SEHOP; SafeSEH; DEP; Data Execution Prevention; bypassing DEP; ASLR; Address Space Layout Randomization; bypassing ASLR; fuzzing; fuzzer; reverse engineering; Computers; Computer Security; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 660
[movies]Day 1 Part 1: Exploits 2: Exploitation in the Windows Environment - Corey K.
The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news @OpenSecTraining. This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows...
Keywords: OpenSecurityTraining.info; Exploits; Vulnerabilities; software vulnerabilities; buffer overflows; smashing the stack; SEH; structured exception handling; SEHOP; SafeSEH; DEP; Data Execution Prevention; bypassing DEP; ASLR; Address Space Layout Randomization; bypassing ASLR; fuzzing; fuzzer; reverse engineering; Computers; Computer Security; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 2,017
[movies]Day 2 Part 3: Exploits 2: Exploitation in the Windows Environment - Corey K.
The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news @OpenSecTraining. This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows...
Keywords: OpenSecurityTraining.info; Exploits; Vulnerabilities; software vulnerabilities; buffer overflows; smashing the stack; SEH; structured exception handling; SEHOP; SafeSEH; DEP; Data Execution Prevention; bypassing DEP; ASLR; Address Space Layout Randomization; bypassing ASLR; fuzzing; fuzzer; reverse engineering; Computers; Computer Security; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 786
[movies]Day 1 Part 4: Exploits 2: Exploitation in the Windows Environment - Corey K.
The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news @OpenSecTraining. This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows...
Keywords: OpenSecurityTraining.info; Exploits; Vulnerabilities; software vulnerabilities; buffer overflows; smashing the stack; SEH; structured exception handling; SEHOP; SafeSEH; DEP; Data Execution Prevention; bypassing DEP; ASLR; Address Space Layout Randomization; bypassing ASLR; fuzzing; fuzzer; reverse engineering; Computers; Computer Security; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 910
[movies]Day 2 Part 4: Exploits 2: Exploitation in the Windows Environment - Corey K.
The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news @OpenSecTraining. This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows...
Keywords: OpenSecurityTraining.info; Exploits; Vulnerabilities; software vulnerabilities; buffer overflows; smashing the stack; SEH; structured exception handling; SEHOP; SafeSEH; DEP; Data Execution Prevention; bypassing DEP; ASLR; Address Space Layout Randomization; bypassing ASLR; fuzzing; fuzzer; reverse engineering; Computers; Computer Security; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 814
[movies]Day 3 Part 4: Exploits 2: Exploitation in the Windows Environment - Corey K.
The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news @OpenSecTraining. This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows...
Keywords: OpenSecurityTraining.info; Exploits; Vulnerabilities; software vulnerabilities; buffer overflows; smashing the stack; SEH; structured exception handling; SEHOP; SafeSEH; DEP; Data Execution Prevention; bypassing DEP; ASLR; Address Space Layout Randomization; bypassing ASLR; fuzzing; fuzzer; reverse engineering; Computers; Computer Security; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 822
[movies]Day 3 Part 3: Exploits 2: Exploitation in the Windows Environment - Corey K.
The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news @OpenSecTraining. This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows...
Keywords: OpenSecurityTraining.info; Exploits; Vulnerabilities; software vulnerabilities; buffer overflows; smashing the stack; SEH; structured exception handling; SEHOP; SafeSEH; DEP; Data Execution Prevention; bypassing DEP; ASLR; Address Space Layout Randomization; bypassing ASLR; fuzzing; fuzzer; reverse engineering; Computers; Computer Security; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 641
[movies]Day 1 Part 5: Exploits 2: Exploitation in the Windows Environment - Corey K.
The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news @OpenSecTraining. This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows...
Keywords: OpenSecurityTraining.info; Exploits; Vulnerabilities; software vulnerabilities; buffer overflows; smashing the stack; SEH; structured exception handling; SEHOP; SafeSEH; DEP; Data Execution Prevention; bypassing DEP; ASLR; Address Space Layout Randomization; bypassing ASLR; fuzzing; fuzzer; reverse engineering; Computers; Computer Security; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 976
[movies]Day 1 Part 2: Exploits 2: Exploitation in the Windows Environment - Corey K.
The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news @OpenSecTraining. This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows...
Keywords: OpenSecurityTraining.info; Exploits; Vulnerabilities; software vulnerabilities; buffer overflows; smashing the stack; SEH; structured exception handling; SEHOP; SafeSEH; DEP; Data Execution Prevention; bypassing DEP; ASLR; Address Space Layout Randomization; bypassing ASLR; fuzzing; fuzzer; reverse engineering; Computers; Computer Security; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 1,024
[movies]Day 2 Part 4: Introduction to Software Exploits - Corey K.
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit ...
Keywords: OpenSecurityTraining.info; Exploits; software vulnerabilities; buffer overflows; smashing the stack; heap overflows; ebp overwrite; reverse engineering; Computer; Computer Security; hacking; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 1,101
[movies]Day 2 Part 2: Introduction to Software Exploits - Corey K.
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit ...
Keywords: OpenSecurityTraining.info; Exploits; software vulnerabilities; buffer overflows; smashing the stack; heap overflows; ebp overwrite; reverse engineering; Computer; Computer Security; hacking; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 1,144
[movies]Day 1 Part 1: Introduction to Software Exploits - Corey K.
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit ...
Keywords: OpenSecurityTraining.info; Exploits; software vulnerabilities; buffer overflows; smashing the stack; heap overflows; ebp overwrite; reverse engineering; Computer; Computer Security; hacking; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 2,449
[movies]Day 1 Part 4: Introduction to Software Exploits - Corey K.
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit ...
Keywords: OpenSecurityTraining.info; Exploits; software vulnerabilities; buffer overflows; smashing the stack; heap overflows; ebp overwrite; reverse engineering; Computer; Computer Security; hacking; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 1,196
[movies]Day 2 Part 5: Introduction to Software Exploits - Corey K.
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit ...
Keywords: OpenSecurityTraining.info; Exploits; software vulnerabilities; buffer overflows; smashing the stack; heap overflows; ebp overwrite; reverse engineering; Computer; Computers Security; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 1,216
[movies]Day 1 Part 5: Introduction to Software Exploits - Corey K.
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit ...
Keywords: OpenSecurityTraining.info; Exploits; software vulnerabilities; buffer overflows; smashing the stack; heap overflows; ebp overwrite; reverse engineering; Computer; Computer Security; hacking; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 1,152
[movies]Day 2 Part 1: Introduction to Software Exploits - Corey K.
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit ...
Keywords: OpenSecurityTraining.info; Exploits; software vulnerabilities; buffer overflows; smashing the stack; heap overflows; ebp overwrite; reverse engineering; Computer; Computer Security; hacking; Technology; Intel; x86; IA32; Training; Education; Multi-day-class; Multi-day-training; Classes
Downloads: 1,130
[1] 2     Next    Last
Advanced search

Group results by:

> Relevance
Mediatype
Collection

Related mediatypes

movies
audio